Chapter 11

Exception, Anomaly, and Threat Detection

Abstract

In addition to point cyber security defenses, behavioral- and anomaly-based threat detection is possible. Learn how to use your knowledge of the process control system and established behavioral baselines to identify potential threats.

Keywords

Exception Reporting
Anomaly Detection
Baseline
Behavior
Information in this Chapter
Exception Reporting
Behavioral Anomaly Detection
Behavioral Whitelisting
Threat Detection
Clear policies about what communications are allowed and what are not have already been obtained by defining zones. The operation within each zone should also be well defined and relatively predictable. This supports two important types of behavioral analysis: ...

Get Industrial Network Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.